“…The cloud CDM performs the following detailed steps and then sends the encrypted request result and ACL. The user, data approval range, period of use, etc., are subject to IRB review, and if approved ( 4 5 6 ), the user finally performs the analysis with the CDM result value ( 7 ). During a series of processes, data are encrypted, and unauthorized users' access is blocked so that the contents cannot be checked.…”